Old UI
  • Documentation Platform
    • Technical Guide
      • Whitelisting
        • Whitelisting the Pictures on Microsoft Outlook Apps
      • Minimum Requirements
      • On-Premise Requirements
        • Restricting the Access to Portal According IP
          • How to Import SSL Certificates in IIS
        • Why does the disk on the server fill up fast?
      • Getting Started
      • Phishing Simulator
      • Awareness Educator
      • Incident Responder
        • How does investigation mechanism work?
          • Benefits of Phishing Incident Responder
          • Reverse Engineering Support
          • Privacy and Security
          • Audit
          • Integrations
        • API Settings
          • Configuration steps for Office 365: Microsoft Graph App Configuration
          • Exchange Mail Configuration
          • GSuite API Configuration Guide
          • Gsuite Mail Configration
        • Analysing Suspicious Emails
          • Starting an Automatic Incident Investigation
          • Starting a Manual Incident Investigation
          • Playbook
        • FAQ (Incident Responder&Phishing Reporter)
      • Phishing Reporter Add-In
        • Installation
        • Microsoft Defender Email Reporter Add-In
      • Email Threat Simulator (ETS)
        • Creating a Trusted Account for E-mail Security Tests
          • Restriction of the Authority of the Test Account
          • Restrict Email Address
          • Enable Mailbox Audit Logging for Test Account
        • Dashboard
        • Quick Scan
        • Advanced Scan
        • Interpretation of ETS Report
        • FAQ ( ETS)
      • Threat Intelligence
        • FAQ (Threat Intelligence)
      • Report Manager
        • Phishing Campaign Report List
          • Phishing Campaign Summary
          • Statistics
          • Opened Email
          • Clicked Link in The Phishing Campaign Email
          • Submitted Form
          • Opened Attachment
          • Phishing Reporter
          • Campaign No response
          • Email Delivery Report
          • Phishing User Compare
          • Departments
        • Training Campaign Reports
          • Training Summary
          • Training Statistics
          • Opened Training Email
          • Clicked Training Link
          • View Duration
          • No Response
          • Sending Report
          • Training User Compare
          • Exam
        • Users KPI
          • User-based Grade
          • Department-based Grade
          • Target Group based grade
          • Company-based grade
        • Advanced Reporting
      • Company
        • User Role Management
      • Advanced Settings
        • Allow Email Domains
        • White Labelling
        • LDAP Settings
        • SCIM Integrations
        • Notification Templates
          • Short Codes
          • Using Notification Templates
        • Data Anonymisation
      • Available for Option
      • API Guide
        • REST API for Incident Responder (IR) Operation
        • REST API for SSO Authentication
      • Diagnostic Tool
        • FAQ
    • Maintenance Tool
    • FAQ (All Modules)
      • Video Tutorials
        • Quick Start
        • Google Workspace API Configuration Guide
        • On Premise Requirement Checker Video
        • Phishing Reporter Installation & Deployment
Powered by GitBook
On this page
  • Compatability
  • How Does the Add-in Work?
  • Logging Mechanism
  • Minimum Computer Specifications
  • Generating Add-in
  • Customization
  • Phishing Reporter Announcement Email Template
  1. Documentation Platform
  2. Technical Guide

Phishing Reporter Add-In

PreviousFAQ (Incident Responder&Phishing Reporter)NextInstallation

Last updated 1 year ago

Phishing Reporter helps users to report the suspicious email for analysis and start an incident investigation with Incident Responder.

To run phishing reporter add-in, make sure you have all of

The main function of Phishing Reporter is to make users easily report suspicious emails to their incident responder. When a user detects a suspicious email by clicking on the Suspicious Email Reporter button, he/she reports it to the incident responder module for analysis. Then, the platform investigates this suspicious email either by its own engine or with third-party integrated services. Click to see “ ”

Benefits to the security operation centre (SOC)

  • It gives the ability to conduct an incident investigation and response without violating the privacy of users.

  • It strengthens the last line of defence by transforming users into “proactive agents” that detect and report attacks.[]

Benefits to an email user

  • Users report suspicious an email with a single click.

  • It allows a user to send a suspicious email to analysis services and get a risk score.

  • Users receive immediate feedback.

[1] It is a way of proactively involving users to protect the institution’s security by getting employees to report suspicious emails.

Compatability

This outlook add-in compatible with the below version of Outlook

Application

Version

Support

Microsoft Windows

Compatible

Outlook 2010

Compatible

Outlook 2013

Compatible

Outlook 2016

Compatible

Microsoft Exchange & OWA

Compatible

Microsoft Outlook on iPhone

Compatible

Microsoft Outlook on Android

Compatible

Microsoft Outlook on Mac

Compatible

Google G-Suite

Compatible

How Does the Add-in Work?

In Outlook, where the add-in is installed, the working principle works as follows:

  1. When add-in opened:

    a. Sends a heartbeat to server

    b. Get order from the server, if there was an investigation or action

  2. When add-in runs:

    a. Sends the heartbeat to the server in periodic time [1]

    b. If any order comes from the server, then start to do this investigation or action [2]

    c. If an error occurred then it logs it to the client-side then send it to our server

  3. When outlook closes itself, then add-in close:

[1] The add-in optimizes this process according to network and machine performance by itself.

[2] When conducting the investigation, the add-in optimizes this process according to the computer and the network situation.

Logging Mechanism

The platform's Add-in logs all problems and reports both of user’s computer (C:\Users\Public\KeepnetLabs\Log) and keepnet server.

In order to resolve the problem, please check the logs.

  • Older Logs: Add-in compresses and archives older logs in .zip format bigger than 8MB

  • Installer: Add-in keeps the logs that appeared during the installation.

  • Keepnet Outlook Add-in Log: The log file that keeps the logs created when add-in functions.

Minimum Computer Specifications

  • Outlook Versions: Outlook 2007/2010/2013/2016

  • CPU Usage: 0% to 5% of CPU

  • RAM Usage: 120~ MB of RAM

  • Disk Usage: 3MB disk space

  • Network Traffic: payload size + http requests size = Approx. 230kbps

Generating Add-in

Customization

When you have logged in to the Platform, the Outlook Add-in menu helps you prepare custom plugins.

Item

Description

Add-In Name

The name you would like to give your Add-in

Brand Name

Brand name of the Add-in you would like to give

Send Suspicious Emails To

The email address suspicious email will be delivered

Suspicious Subject and Content

Notification message about Suspicious Subject and Content

Thank You Message

Thank You Message content

Delete Message

Delete Message content

Warning Label

Warning Label content

Add-In Logo

Put a logo for your Add-In

Other Optional Features

Reporting

Report the suspicious email to the server (it’s activated by default)

Move it to the spam box

Move the suspicious email to the spam box

Delete original email

Delete the original email content

Track user actions

Log user’s actions (beta)

Investigate email from user’s inbox

Action to analyse suspicious content from user inbox

Send a copy of the email to us

Bend the copy of suspicious content to Keepnet Labs

Proxy Settings

The feature to be used if the proxy server support is desired

On-Premise Settings

The values to create their own custom plugin need to be defined by firms that use on-premise.

Phishing Reporter Announcement Email Template

To inform your users about the Phishing Reporter Outlook add-in, you can use the following text.

Dear …. Team,

We are happy to announce to you the new outlook function: “Suspicious (Phishing) E-mail Reporter”.

This Outlook add-in will help you to easily and instantly report suspicious emails to Information Security Team for analysis.

Please read the instructions below to understand how to use this add-on.

What is Phishing Reporter add-in?

Phishing Reporter add-on is a button placed on Microsoft Outlook’s menu bar under the “Home” tab. This button will enable you to report suspicious email to us.

It will also give us the opportunity to timely identify email-borne cyber-threats and take certain actions at the system level before any damage occurs.

What will the add-on bring?

  • You can report attacks with a single click.

  • Timely notifications of "Phishing" attacks will help the information security team to be more proactive and will reinforce our company’s cybersecurity posture.

  • The add-in will help you to be more aware of cyber risks.

A Sample Usage

  1. The user clicks on the “ Report Phishing” button to report the suspicious email, then he/she is asked whether to delete the original email or not.

  2. The user is then appreciated by his/her attentive action.

  3. At the end of this process, the result of the analysis of the suspicious email you reported will be sent to you via email.

To get the most up-to-date version of the plugin, you can access the Incident Response> Outlook Plugin page from the interface. You can create an add-in as you like in the following criteria.

pre-requisites
Visual Studio 2010 Tools for Office Runtime.
How does an investigation mechanism work?
1
Keepnet cloud
Outlook add-in log directory